SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Identity Theft
Awareness
Workshop
By Deb Vosejpka
Lesson 1:
Identity Theft Basics
What is Identity Theft?
Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity, usually as a method to gain access to
resources or obtain credit and other benefits in that
person's name. The victim of identity theft (here meaning
the person whose identity has been assumed by the
identity thief) can suffer adverse consequences if they are
held responsible for the perpetrator's actions. Identity theft
occurs when someone uses another's personally identifying
information, like their name, identifying number, or credit
card number, without their permission, to commit fraud or
other crimes.
http://en.wikipedia.org/wiki/Identity_theft
Is Identity Theft Preventable?
Not entirely. There are some precautions we
can take to help minimize the risk (which we’ll
discuss in other presentations), but there are
many circumstances that are not within our
control.
Identity theft can be a result of a random act or
targeted event.
How thieves get your information
Thieves strive to get your information through personal,
commercial, and government means. Let’s start with
commercial and government. To get a better sense of
how thieves acquire your information via data breaches,
visit www.privacyrights.org . Download the
pdf or spreadsheet to view the data breaches
since 2005.
There you’ll find specific events for each data
breach. Your exposed information can be the
result of a hacker, unintended disclosure,
insider theft, stolen equipment , improper
disposal of documents and a plethora of
other electronic methods.
How your data is stolen through
personal means
The top 10 scams over the past decade:
Phishing
Pretexting
Fake Job Offers
Skimming
Dumpster Diving
Pickpocketing
Purse Snatching
Malware and Spyware
Fake Tax Filing
Change of Address
How your personal information is
being used
• Commit crimes in your name
• Acquire medical care
• File tax refunds
• Apply for social security benefits
• Open bank and credit card accounts
• Secure mortgage or car loans
• Start businesses or professional contracts
• Obtain employment
What you may expect when you become a
victim of identity theft!
• Denied employment
• Denied security clearance
• Denied loans or bank accounts
• Denied health care, medicines
• Denied professional licenses or
small business opportunities
• Increased insurance costs
• Increased risk for:
-Harassment from debt collectors
-Arrest for crimes
-Negative credit reporting
• Loss of wages for time off work:
- Contact Collection Agencies
- Contact Employers
- Contact Credit Bureaus/Creditors
- Contact Attorneys
- Contact Investigators
- Contact Government Agencies
- Contact Local Law Enforcement
- Contact Banking Institutions
- Contact Retailers and Businesses
- Contact Post Office
- Contact Education Institutions
…each and every time a theft occurs
Prevention Tips
• Use strong passwords like iGfcin2009! (I graduated from college in 2009!)
and PINS.
• Open and respond to notifications of data breaches from banks, vendors,
retailers etc.
• Safeguard important documents like: social security card, passport,
medical card, gun permit, birth certificate, drivers license, student id.
• Watch for hidden cameras in brochure holders at ATM’s and skimmers at
gas pumps and bank kiosks.
• Watch for URL in websites. All legitimate sites have http(s):// (s = secure).
• Shred or burn documents before discarding them.
• Pick up mail daily. Don’t make it easy for thieves to apply for credit.
• Invest in anti-virus software. Be suspicious of malware and phishing.
• Be alert. Absence of mail, credit denial, charges on statements.
• Don’t do any financial transactions on an open WI-Fi network.
• Frequently monitor bank , credit card and investment accounts.
You could be at great risk if…
• Suddenly you stop receiving mail.
• You get phone calls from collectors regarding debts
that are not yours.
• Your bank accounts have been compromised.
• You’ve been locked out of your online accounts or
emails.
• Your automatic deposits are missing.
• You receive mail for matters not initiated by you.
• You are arrested for criminal acts you did not
commit.
How to protect yourself and help others!
• Stay alert!
• Stay informed, write to receive helpful tips,
resources, and solutions.
• Become an advocate and share your knowledge.
• Get protection.
Deb Vosejpka
www.marketcommunicationsofmn.com

Mais conteúdo relacionado

Mais procurados

Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
ronwolfinger
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 
Data theft
Data theftData theft
Data theft
Laura
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 

Mais procurados (20)

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Data theft
Data theftData theft
Data theft
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 

Destaque (6)

Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
Birth & death registration - west bengal
Birth & death registration  - west bengalBirth & death registration  - west bengal
Birth & death registration - west bengal
 
Death and birth certificate
Death and birth certificateDeath and birth certificate
Death and birth certificate
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Registration of births & deaths act ppt
Registration of births & deaths act pptRegistration of births & deaths act ppt
Registration of births & deaths act ppt
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Semelhante a Identity Theft Awareness 101 - Basics

Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
danc752
 

Semelhante a Identity Theft Awareness 101 - Basics (18)

Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Identity Theft Awareness 101 - Basics

  • 1. Identity Theft Awareness Workshop By Deb Vosejpka Lesson 1: Identity Theft Basics
  • 2. What is Identity Theft? Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. http://en.wikipedia.org/wiki/Identity_theft
  • 3. Is Identity Theft Preventable? Not entirely. There are some precautions we can take to help minimize the risk (which we’ll discuss in other presentations), but there are many circumstances that are not within our control. Identity theft can be a result of a random act or targeted event.
  • 4. How thieves get your information Thieves strive to get your information through personal, commercial, and government means. Let’s start with commercial and government. To get a better sense of how thieves acquire your information via data breaches, visit www.privacyrights.org . Download the pdf or spreadsheet to view the data breaches since 2005. There you’ll find specific events for each data breach. Your exposed information can be the result of a hacker, unintended disclosure, insider theft, stolen equipment , improper disposal of documents and a plethora of other electronic methods.
  • 5. How your data is stolen through personal means The top 10 scams over the past decade: Phishing Pretexting Fake Job Offers Skimming Dumpster Diving Pickpocketing Purse Snatching Malware and Spyware Fake Tax Filing Change of Address
  • 6. How your personal information is being used • Commit crimes in your name • Acquire medical care • File tax refunds • Apply for social security benefits • Open bank and credit card accounts • Secure mortgage or car loans • Start businesses or professional contracts • Obtain employment
  • 7. What you may expect when you become a victim of identity theft! • Denied employment • Denied security clearance • Denied loans or bank accounts • Denied health care, medicines • Denied professional licenses or small business opportunities • Increased insurance costs • Increased risk for: -Harassment from debt collectors -Arrest for crimes -Negative credit reporting • Loss of wages for time off work: - Contact Collection Agencies - Contact Employers - Contact Credit Bureaus/Creditors - Contact Attorneys - Contact Investigators - Contact Government Agencies - Contact Local Law Enforcement - Contact Banking Institutions - Contact Retailers and Businesses - Contact Post Office - Contact Education Institutions …each and every time a theft occurs
  • 8. Prevention Tips • Use strong passwords like iGfcin2009! (I graduated from college in 2009!) and PINS. • Open and respond to notifications of data breaches from banks, vendors, retailers etc. • Safeguard important documents like: social security card, passport, medical card, gun permit, birth certificate, drivers license, student id. • Watch for hidden cameras in brochure holders at ATM’s and skimmers at gas pumps and bank kiosks. • Watch for URL in websites. All legitimate sites have http(s):// (s = secure). • Shred or burn documents before discarding them. • Pick up mail daily. Don’t make it easy for thieves to apply for credit. • Invest in anti-virus software. Be suspicious of malware and phishing. • Be alert. Absence of mail, credit denial, charges on statements. • Don’t do any financial transactions on an open WI-Fi network. • Frequently monitor bank , credit card and investment accounts.
  • 9. You could be at great risk if… • Suddenly you stop receiving mail. • You get phone calls from collectors regarding debts that are not yours. • Your bank accounts have been compromised. • You’ve been locked out of your online accounts or emails. • Your automatic deposits are missing. • You receive mail for matters not initiated by you. • You are arrested for criminal acts you did not commit.
  • 10. How to protect yourself and help others! • Stay alert! • Stay informed, write to receive helpful tips, resources, and solutions. • Become an advocate and share your knowledge. • Get protection. Deb Vosejpka www.marketcommunicationsofmn.com